PHI Use Sample Clauses

PHI Use. Provider is not prohibited by this BAA Agreement from utilizing PHI for its proper management and administration or to carry out its legal responsibilities, if any. Further, Provider is not prohibited from disclosing PHI for its proper management and administration or to carry out its legal responsibilities if the disclosure is required by Law or Provider obtains reasonable assurances from the person to whom the information is disclosed that it will be held confidentially and used or further disclosed only as required by Law or for the purpose for which it was disclosed to the person. Provider will further require that the person to whom information is disclosed inform the Provider of any breach of confidentiality or violation of the HIPAA Regulations with respect to that information. In such event, Provider will notify Plan of any instances of which it is aware in which the confidentiality of the information has been breached or the Privacy Rule was otherwise violated.
AutoNDA by SimpleDocs
PHI Use. Claim Administrator will be permitted to use GHP’s PHI as necessary for Claim Administrator’s proper management and administration or to carry out Claim Administrator’s legal responsibilities.
PHI Use. Business Associate may use Covered Entity’s PHI as necessary for Business Associate to perform Data Aggregation services, and to create De- identified Information, Summary Health Information and/or Limited Data sets.

Related to PHI Use

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

  • Improper Use Evidence substantiating the use of sick leave for willful injury, gross negligence, intemperance, trivial indispositions, instances of misrepresentation, or violation of the rules defined herein will result in denial of sick leave with pay and shall be construed as grounds for disciplinary action including termination.

  • License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not xxx, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.

  • Residential Use Use the Apartment for residential purpose only. Under no circumstances shall the Allottee use or allow the Apartment to be used for commercial, industrial or other non-residential purposes. The Allottee shall also not use or allow the Apartment to be used as a religious establishment, hotel, guesthouse, service apartment, mess, hostel, boarding house, restaurant, nursing home, club, school or other public gathering place.

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.

  • Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit A or stated in the Service Agreement and/or otherwise authorized under the statutes referred to herein this DPA.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

  • Commercial Use the use of the Licensed Material for the purpose of monetary reward (whether by or for the Institution or an Authorised User) by means of sale, resale, loan, transfer, hire or other form of exploitation of the Licensed Material. For the avoidance of doubt, the use by the Institution or Authorised Users of the Licensed Material in the course of research funded by a commercial organisation is not deemed to constitute Commercial Use. Recovery of costs is not being deemed Commercial Use.

  • License for Txdot Logo Use DocuSign Envelope ID: A2C96816-AFCF-4B6A-9B51-D8FCE6C6223E DocuSign Envelope ID: 81600B2C-53E9-4E39-BA73-002AB2A7A001

  • Third Party Use You may allow your agents, contractors and outsourcing service providers (each a “Permitted Third Party”) to use the Product(s) licensed to you hereunder solely for your benefit in accordance with the terms of this XXXX and you are responsible for any such Permitted Third Party’s compliance with this XXXX in such use. Any breach by any Permitted Third Party of the terms of this XXXX will be considered your breach.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!